2018-07-23 09:45:01 +02:00
|
|
|
const { describe, it, beforeEach } = require('mocha')
|
2018-06-25 08:24:37 +02:00
|
|
|
const assert = require('assert')
|
|
|
|
const proxyquire = require('proxyquire')
|
|
|
|
const hoodwink = require('hoodwink')
|
2014-10-17 04:31:01 +02:00
|
|
|
|
2019-01-04 10:33:02 +01:00
|
|
|
const ECPair = require('../src/ecpair')
|
2018-06-25 08:24:37 +02:00
|
|
|
const tinysecp = require('tiny-secp256k1')
|
2014-10-17 04:31:01 +02:00
|
|
|
|
2018-06-25 08:24:37 +02:00
|
|
|
const fixtures = require('./fixtures/ecpair.json')
|
2014-10-17 04:31:01 +02:00
|
|
|
|
2019-01-04 10:33:02 +01:00
|
|
|
const NETWORKS = require('../src/networks')
|
2018-06-25 08:24:37 +02:00
|
|
|
const NETWORKS_LIST = [] // Object.values(NETWORKS)
|
2018-05-22 08:33:43 +02:00
|
|
|
for (let networkName in NETWORKS) {
|
2015-07-28 08:42:57 +02:00
|
|
|
NETWORKS_LIST.push(NETWORKS[networkName])
|
|
|
|
}
|
|
|
|
|
2018-06-25 08:24:37 +02:00
|
|
|
const ZERO = Buffer.alloc(32, 0)
|
|
|
|
const ONE = Buffer.from('0000000000000000000000000000000000000000000000000000000000000001', 'hex')
|
|
|
|
const GROUP_ORDER = Buffer.from('fffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364141', 'hex')
|
|
|
|
const GROUP_ORDER_LESS_1 = Buffer.from('fffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364140', 'hex')
|
2018-05-22 08:33:43 +02:00
|
|
|
|
2019-04-09 08:09:50 +02:00
|
|
|
describe('ECPair', () => {
|
|
|
|
describe('getPublicKey', () => {
|
2018-07-26 09:35:31 +02:00
|
|
|
let keyPair
|
|
|
|
|
2019-04-09 08:09:50 +02:00
|
|
|
beforeEach(() => {
|
2018-07-26 09:35:31 +02:00
|
|
|
keyPair = ECPair.fromPrivateKey(ONE)
|
|
|
|
})
|
|
|
|
|
2019-04-09 08:09:50 +02:00
|
|
|
it('calls pointFromScalar lazily', hoodwink(() => {
|
2018-12-30 03:23:28 +01:00
|
|
|
assert.strictEqual(keyPair.__Q, undefined)
|
2018-07-26 09:35:31 +02:00
|
|
|
|
|
|
|
// .publicKey forces the memoization
|
|
|
|
assert.strictEqual(keyPair.publicKey.toString('hex'), '0279be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798')
|
|
|
|
assert.strictEqual(keyPair.__Q.toString('hex'), '0279be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798')
|
|
|
|
}))
|
|
|
|
})
|
|
|
|
|
2019-04-09 08:09:50 +02:00
|
|
|
describe('fromPrivateKey', () => {
|
|
|
|
it('defaults to compressed', () => {
|
2018-06-25 08:37:45 +02:00
|
|
|
const keyPair = ECPair.fromPrivateKey(ONE)
|
2014-10-17 04:31:01 +02:00
|
|
|
|
2015-05-07 03:29:20 +02:00
|
|
|
assert.strictEqual(keyPair.compressed, true)
|
2014-10-17 04:31:01 +02:00
|
|
|
})
|
|
|
|
|
2019-04-09 08:09:50 +02:00
|
|
|
it('supports the uncompressed option', () => {
|
2018-06-25 08:37:45 +02:00
|
|
|
const keyPair = ECPair.fromPrivateKey(ONE, {
|
2014-10-17 04:31:01 +02:00
|
|
|
compressed: false
|
|
|
|
})
|
|
|
|
|
2015-05-07 03:29:20 +02:00
|
|
|
assert.strictEqual(keyPair.compressed, false)
|
2014-10-17 04:31:01 +02:00
|
|
|
})
|
|
|
|
|
2019-04-09 08:09:50 +02:00
|
|
|
it('supports the network option', () => {
|
2018-06-25 08:37:45 +02:00
|
|
|
const keyPair = ECPair.fromPrivateKey(ONE, {
|
2014-10-17 04:31:01 +02:00
|
|
|
compressed: false,
|
2015-07-28 08:42:57 +02:00
|
|
|
network: NETWORKS.testnet
|
2014-10-17 04:31:01 +02:00
|
|
|
})
|
|
|
|
|
2015-07-28 08:42:57 +02:00
|
|
|
assert.strictEqual(keyPair.network, NETWORKS.testnet)
|
2014-10-17 04:31:01 +02:00
|
|
|
})
|
|
|
|
|
2019-04-09 08:09:50 +02:00
|
|
|
fixtures.valid.forEach(f => {
|
|
|
|
it('derives public key for ' + f.WIF, () => {
|
2018-06-25 08:37:45 +02:00
|
|
|
const d = Buffer.from(f.d, 'hex')
|
|
|
|
const keyPair = ECPair.fromPrivateKey(d, {
|
2014-10-17 04:31:01 +02:00
|
|
|
compressed: f.compressed
|
|
|
|
})
|
|
|
|
|
2018-05-30 03:19:46 +02:00
|
|
|
assert.strictEqual(keyPair.publicKey.toString('hex'), f.Q)
|
2014-10-17 04:31:01 +02:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2019-04-09 08:09:50 +02:00
|
|
|
fixtures.invalid.fromPrivateKey.forEach(f => {
|
|
|
|
it('throws ' + f.exception, () => {
|
2018-07-26 09:35:31 +02:00
|
|
|
const d = Buffer.from(f.d, 'hex')
|
2019-04-09 08:09:50 +02:00
|
|
|
assert.throws(() => {
|
2018-07-26 09:35:31 +02:00
|
|
|
ECPair.fromPrivateKey(d, f.options)
|
|
|
|
}, new RegExp(f.exception))
|
2014-10-17 04:31:01 +02:00
|
|
|
})
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2019-04-09 08:09:50 +02:00
|
|
|
describe('fromPublicKey', () => {
|
|
|
|
fixtures.invalid.fromPublicKey.forEach(f => {
|
|
|
|
it('throws ' + f.exception, () => {
|
2018-07-26 09:35:31 +02:00
|
|
|
const Q = Buffer.from(f.Q, 'hex')
|
2019-04-09 08:09:50 +02:00
|
|
|
assert.throws(() => {
|
2018-07-26 09:35:31 +02:00
|
|
|
ECPair.fromPublicKey(Q, f.options)
|
|
|
|
}, new RegExp(f.exception))
|
|
|
|
})
|
2014-10-17 04:31:01 +02:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2019-04-09 08:09:50 +02:00
|
|
|
describe('fromWIF', () => {
|
|
|
|
fixtures.valid.forEach(f => {
|
|
|
|
it('imports ' + f.WIF + ' (' + f.network + ')', () => {
|
2018-06-25 08:37:45 +02:00
|
|
|
const network = NETWORKS[f.network]
|
|
|
|
const keyPair = ECPair.fromWIF(f.WIF, network)
|
2015-07-28 08:42:57 +02:00
|
|
|
|
2018-05-30 03:19:46 +02:00
|
|
|
assert.strictEqual(keyPair.privateKey.toString('hex'), f.d)
|
2015-07-28 08:42:57 +02:00
|
|
|
assert.strictEqual(keyPair.compressed, f.compressed)
|
|
|
|
assert.strictEqual(keyPair.network, network)
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2019-04-09 08:09:50 +02:00
|
|
|
fixtures.valid.forEach(f => {
|
|
|
|
it('imports ' + f.WIF + ' (via list of networks)', () => {
|
2018-06-25 08:37:45 +02:00
|
|
|
const keyPair = ECPair.fromWIF(f.WIF, NETWORKS_LIST)
|
2014-10-17 04:31:01 +02:00
|
|
|
|
2018-05-30 03:19:46 +02:00
|
|
|
assert.strictEqual(keyPair.privateKey.toString('hex'), f.d)
|
2015-05-07 03:29:20 +02:00
|
|
|
assert.strictEqual(keyPair.compressed, f.compressed)
|
2015-07-28 08:42:57 +02:00
|
|
|
assert.strictEqual(keyPair.network, NETWORKS[f.network])
|
2014-10-17 04:31:01 +02:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2019-04-09 08:09:50 +02:00
|
|
|
fixtures.invalid.fromWIF.forEach(f => {
|
|
|
|
it('throws on ' + f.WIF, () => {
|
|
|
|
assert.throws(() => {
|
2018-06-25 08:37:45 +02:00
|
|
|
const networks = f.network ? NETWORKS[f.network] : NETWORKS_LIST
|
2016-02-25 03:26:05 +01:00
|
|
|
|
|
|
|
ECPair.fromWIF(f.WIF, networks)
|
2014-10-17 04:31:01 +02:00
|
|
|
}, new RegExp(f.exception))
|
|
|
|
})
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2019-04-09 08:09:50 +02:00
|
|
|
describe('toWIF', () => {
|
|
|
|
fixtures.valid.forEach(f => {
|
|
|
|
it('exports ' + f.WIF, () => {
|
2018-06-25 08:37:45 +02:00
|
|
|
const keyPair = ECPair.fromWIF(f.WIF, NETWORKS_LIST)
|
|
|
|
const result = keyPair.toWIF()
|
2015-05-07 03:29:20 +02:00
|
|
|
assert.strictEqual(result, f.WIF)
|
2014-10-17 04:31:01 +02:00
|
|
|
})
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2019-04-09 08:09:50 +02:00
|
|
|
describe('makeRandom', () => {
|
2018-06-25 08:37:45 +02:00
|
|
|
const d = Buffer.alloc(32, 4)
|
|
|
|
const exWIF = 'KwMWvwRJeFqxYyhZgNwYuYjbQENDAPAudQx5VEmKJrUZcq6aL2pv'
|
2014-10-17 04:31:01 +02:00
|
|
|
|
2019-04-09 08:09:50 +02:00
|
|
|
describe('uses randombytes RNG', () => {
|
|
|
|
it('generates a ECPair', () => {
|
|
|
|
const stub = { randombytes: () => { return d } }
|
2019-01-04 10:33:02 +01:00
|
|
|
const ProxiedECPair = proxyquire('../src/ecpair', stub)
|
2014-10-17 04:31:01 +02:00
|
|
|
|
2018-06-25 08:37:45 +02:00
|
|
|
const keyPair = ProxiedECPair.makeRandom()
|
2015-05-07 03:29:20 +02:00
|
|
|
assert.strictEqual(keyPair.toWIF(), exWIF)
|
2014-10-17 04:31:01 +02:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2019-04-09 08:09:50 +02:00
|
|
|
it('allows a custom RNG to be used', () => {
|
2018-06-25 08:37:45 +02:00
|
|
|
const keyPair = ECPair.makeRandom({
|
2019-04-09 08:09:50 +02:00
|
|
|
rng: size => { return d.slice(0, size) }
|
2014-10-17 04:31:01 +02:00
|
|
|
})
|
|
|
|
|
2015-05-07 03:29:20 +02:00
|
|
|
assert.strictEqual(keyPair.toWIF(), exWIF)
|
2014-10-17 04:31:01 +02:00
|
|
|
})
|
2015-09-08 15:39:31 +02:00
|
|
|
|
2019-04-09 08:09:50 +02:00
|
|
|
it('retains the same defaults as ECPair constructor', () => {
|
2018-06-25 08:37:45 +02:00
|
|
|
const keyPair = ECPair.makeRandom()
|
2016-10-10 04:01:51 +02:00
|
|
|
|
|
|
|
assert.strictEqual(keyPair.compressed, true)
|
|
|
|
assert.strictEqual(keyPair.network, NETWORKS.bitcoin)
|
|
|
|
})
|
|
|
|
|
2019-04-09 08:09:50 +02:00
|
|
|
it('supports the options parameter', () => {
|
2018-06-25 08:37:45 +02:00
|
|
|
const keyPair = ECPair.makeRandom({
|
2016-10-10 04:01:51 +02:00
|
|
|
compressed: false,
|
|
|
|
network: NETWORKS.testnet
|
|
|
|
})
|
|
|
|
|
|
|
|
assert.strictEqual(keyPair.compressed, false)
|
|
|
|
assert.strictEqual(keyPair.network, NETWORKS.testnet)
|
|
|
|
})
|
|
|
|
|
2019-04-09 08:09:50 +02:00
|
|
|
it('throws if d is bad length', () => {
|
2018-03-20 03:19:39 +01:00
|
|
|
function rng () {
|
2018-05-22 08:33:43 +02:00
|
|
|
return Buffer.alloc(28)
|
2018-03-20 03:19:39 +01:00
|
|
|
}
|
|
|
|
|
2019-04-09 08:09:50 +02:00
|
|
|
assert.throws(() => {
|
2018-03-20 03:19:39 +01:00
|
|
|
ECPair.makeRandom({ rng: rng })
|
|
|
|
}, /Expected Buffer\(Length: 32\), got Buffer\(Length: 28\)/)
|
|
|
|
})
|
|
|
|
|
2018-05-22 08:33:43 +02:00
|
|
|
it('loops until d is within interval [1, n) : 1', hoodwink(function () {
|
2019-04-09 08:09:50 +02:00
|
|
|
const rng = this.stub(() => {
|
2018-09-13 09:34:50 +02:00
|
|
|
if (rng.calls === 0) return ZERO // 0
|
2018-05-22 08:33:43 +02:00
|
|
|
return ONE // >0
|
2018-03-20 03:19:39 +01:00
|
|
|
}, 2)
|
2016-12-13 23:42:21 +01:00
|
|
|
|
|
|
|
ECPair.makeRandom({ rng: rng })
|
|
|
|
}))
|
|
|
|
|
2018-05-22 08:33:43 +02:00
|
|
|
it('loops until d is within interval [1, n) : n - 1', hoodwink(function () {
|
2019-04-09 08:09:50 +02:00
|
|
|
const rng = this.stub(() => {
|
2018-09-13 09:34:50 +02:00
|
|
|
if (rng.calls === 0) return ZERO // <1
|
|
|
|
if (rng.calls === 1) return GROUP_ORDER // >n-1
|
2018-05-22 08:33:43 +02:00
|
|
|
return GROUP_ORDER_LESS_1 // n-1
|
2018-03-20 03:19:39 +01:00
|
|
|
}, 3)
|
2015-09-08 15:39:31 +02:00
|
|
|
|
|
|
|
ECPair.makeRandom({ rng: rng })
|
|
|
|
}))
|
2014-10-17 04:31:01 +02:00
|
|
|
})
|
|
|
|
|
2019-04-09 08:09:50 +02:00
|
|
|
describe('.network', () => {
|
|
|
|
fixtures.valid.forEach(f => {
|
|
|
|
it('returns ' + f.network + ' for ' + f.WIF, () => {
|
2018-06-25 08:37:45 +02:00
|
|
|
const network = NETWORKS[f.network]
|
|
|
|
const keyPair = ECPair.fromWIF(f.WIF, NETWORKS_LIST)
|
2015-09-21 09:37:21 +02:00
|
|
|
|
2018-05-30 03:19:46 +02:00
|
|
|
assert.strictEqual(keyPair.network, network)
|
2015-09-21 09:37:21 +02:00
|
|
|
})
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2019-04-09 08:09:50 +02:00
|
|
|
describe('tinysecp wrappers', () => {
|
2018-06-25 08:37:45 +02:00
|
|
|
let keyPair
|
|
|
|
let hash
|
|
|
|
let signature
|
2014-10-17 04:31:01 +02:00
|
|
|
|
2019-04-09 08:09:50 +02:00
|
|
|
beforeEach(() => {
|
2014-10-17 04:31:01 +02:00
|
|
|
keyPair = ECPair.makeRandom()
|
2018-05-22 08:33:43 +02:00
|
|
|
hash = ZERO
|
|
|
|
signature = Buffer.alloc(64, 1)
|
2014-10-17 04:31:01 +02:00
|
|
|
})
|
|
|
|
|
2019-04-09 08:09:50 +02:00
|
|
|
describe('signing', () => {
|
2018-05-22 08:33:43 +02:00
|
|
|
it('wraps tinysecp.sign', hoodwink(function () {
|
2019-04-09 08:09:50 +02:00
|
|
|
this.mock(tinysecp, 'sign', (h, d) => {
|
2018-03-20 03:19:39 +01:00
|
|
|
assert.strictEqual(h, hash)
|
2018-05-30 03:19:46 +02:00
|
|
|
assert.strictEqual(d, keyPair.privateKey)
|
2018-05-22 08:33:43 +02:00
|
|
|
return signature
|
2018-03-20 03:19:39 +01:00
|
|
|
}, 1)
|
2014-10-17 04:31:01 +02:00
|
|
|
|
2018-05-22 08:33:43 +02:00
|
|
|
assert.strictEqual(keyPair.sign(hash), signature)
|
2014-10-17 04:31:01 +02:00
|
|
|
}))
|
|
|
|
|
2019-04-09 08:09:50 +02:00
|
|
|
it('throws if no private key is found', () => {
|
2019-03-07 04:06:12 +01:00
|
|
|
delete keyPair.__D
|
2014-10-17 04:31:01 +02:00
|
|
|
|
2019-04-09 08:09:50 +02:00
|
|
|
assert.throws(() => {
|
2014-10-17 04:31:01 +02:00
|
|
|
keyPair.sign(hash)
|
|
|
|
}, /Missing private key/)
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2019-04-09 08:09:50 +02:00
|
|
|
describe('verify', () => {
|
2018-05-22 08:33:43 +02:00
|
|
|
it('wraps tinysecp.verify', hoodwink(function () {
|
2019-04-09 08:09:50 +02:00
|
|
|
this.mock(tinysecp, 'verify', (h, q, s) => {
|
2018-03-20 03:19:39 +01:00
|
|
|
assert.strictEqual(h, hash)
|
2018-05-30 03:19:46 +02:00
|
|
|
assert.strictEqual(q, keyPair.publicKey)
|
2018-05-22 08:33:43 +02:00
|
|
|
assert.strictEqual(s, signature)
|
|
|
|
return true
|
2018-03-20 03:19:39 +01:00
|
|
|
}, 1)
|
2014-10-17 04:31:01 +02:00
|
|
|
|
2018-05-22 08:33:43 +02:00
|
|
|
assert.strictEqual(keyPair.verify(hash, signature), true)
|
2014-10-17 04:31:01 +02:00
|
|
|
}))
|
|
|
|
})
|
|
|
|
})
|
2019-04-15 08:28:01 +02:00
|
|
|
describe('optional low R signing', () => {
|
|
|
|
const sig = Buffer.from('95a6619140fca3366f1d3b013b0367c4f86e39508a50fdce' +
|
|
|
|
'e5245fbb8bd60aa6086449e28cf15387cf9f85100bfd0838624ca96759e59f65c10a00' +
|
|
|
|
'16b86f5229', 'hex')
|
|
|
|
const sigLowR = Buffer.from('6a2660c226e8055afad317eeba918a304be79208d505' +
|
|
|
|
'3bc5ea4a5e4c5892b4a061c717c5284ae5202d721c0e49b4717b79966280906b1d3b52' +
|
|
|
|
'95d1fdde963c35', 'hex')
|
|
|
|
const lowRKeyPair = ECPair.fromWIF('L3nThUzbAwpUiBAjR5zCu66ybXSPMr2zZ3ikp' +
|
|
|
|
'ScpTPiYTxBynfZu')
|
|
|
|
const dataToSign = Buffer.from('b6c5c548a7f6164c8aa7af5350901626ebd69f9ae' +
|
|
|
|
'2c1ecf8871f5088ec204cfe', 'hex')
|
|
|
|
|
|
|
|
it('signs with normal R by default', () => {
|
|
|
|
const signed = lowRKeyPair.sign(dataToSign)
|
|
|
|
assert.deepStrictEqual(sig, signed)
|
|
|
|
})
|
|
|
|
|
|
|
|
it('signs with low R when true is passed', () => {
|
|
|
|
const signed = lowRKeyPair.sign(dataToSign, true)
|
|
|
|
assert.deepStrictEqual(sigLowR, signed)
|
|
|
|
})
|
|
|
|
})
|
2014-10-17 04:31:01 +02:00
|
|
|
})
|